I don’t have any Paradox tags to do the testing myself
but you got sooooooo close to the answer yourself…
therefore
Give a man a fish vs. Teach a man to fish
A good thing about the Proxmark3 is, it will prompt you and give you options
For example, to find out what commands I have available to me using a Paradox, I just typed in
lf para
this is the return
help This help
demod demodulate a Paradox FSK tag from the GraphBuffer
reader attempt to read and extract tag data
clone clone paradox tag
sim simulate paradox tag
so to read, the command is
lf para reader
Paradox TAG ID: 00000000 (Full ID: 000000000) - FC: 2 - Card: 023263- Checksum: 50 - RAW: 0f5545ew45ew45ew54ew54a
to clone
lf para clone
this is the return ( because I didn’t know the syntax, it “tells” me how to input the command ) it gives examples
lf paradox clone --raw 0f55555695596a6a9999a59a -> encode for T55x7 tag
lf paradox clone --raw 0f55555695596a6a9999a59a --q5 -> encode for Q5/T5555 tag
lf paradox clone --raw 0f55555695596a6a9999a59a --em -> encode for EM4305/4469
therefore, if you want
Then
lf paradox clone --raw 0f5545ew45ew45ew54ew54a --em
I’m pretty sure this WOULD work EXCEPT, your HEX string is only 23 characters - it should be 24
extra hint:
You can ctrl + c to copy, BUT to paste, you simply need to right click at the command prompt
I hope this works for you, and I hope I haven’t put you crook
good luck, let us all know how you go